Patent classifications
H04L67/14
Application records using session information
Techniques are disclosed for the identification of applications from communication sessions of network traffic between client devices and the generation of application-specific metrics for network traffic associated with the applications. In one example, a router obtains metrics for a plurality of packets. The router determines a session of a plurality of sessions associated with each packet. For each determined session, the router generates metrics for the session from the metrics of the packets associated with the session and determines an application of a plurality of applications associated with the session. For each determined application, the router generates metrics for the application from the metrics of the sessions associated with the application and transmits, to a device, the metrics for the application. In some examples, the router generates the metrics for each application on a per-client, per-next-hop, or per-traffic class basis.
Application records using session information
Techniques are disclosed for the identification of applications from communication sessions of network traffic between client devices and the generation of application-specific metrics for network traffic associated with the applications. In one example, a router obtains metrics for a plurality of packets. The router determines a session of a plurality of sessions associated with each packet. For each determined session, the router generates metrics for the session from the metrics of the packets associated with the session and determines an application of a plurality of applications associated with the session. For each determined application, the router generates metrics for the application from the metrics of the sessions associated with the application and transmits, to a device, the metrics for the application. In some examples, the router generates the metrics for each application on a per-client, per-next-hop, or per-traffic class basis.
NAVIGATION SYSTEM WITH COMMUNICATION MECHANISM AND METHOD OF OPERATION THEREOF
A method of operation of a navigation system includes: determining a POI (point-of-interest) based on comparing a destination description and a POI information for a match; determining a privacy preference for communicating with a device; generating a temporary contact based on the POI and the privacy preference representing an anonymous mode; and establishing a communication session between a contact address and the temporary contact with a control unit based on the privacy preference for communicating with the POI.
DYNAMIC ADJUSTMENT OF KEEP-ALIVE MESSAGES FOR EFFICIENT BATTERY USAGE IN A MOBILE NETWORK
A method for IP [=Internet Protocol] communication between a mobile terminal and its correspondent node in a mobile radio network. The method comprises establishing an IP connection between the mobile terminal and its correspondent node. After detecting a period of inactivity in the IP connection, keep-alive messages are sent via the IP connection at predetermined intervals, which are varied. The method comprises monitoring the lengths of several periods of inactivity at which the mobile radio network disconnects the IP connection.
DYNAMIC ADJUSTMENT OF KEEP-ALIVE MESSAGES FOR EFFICIENT BATTERY USAGE IN A MOBILE NETWORK
A method for IP [=Internet Protocol] communication between a mobile terminal and its correspondent node in a mobile radio network. The method comprises establishing an IP connection between the mobile terminal and its correspondent node. After detecting a period of inactivity in the IP connection, keep-alive messages are sent via the IP connection at predetermined intervals, which are varied. The method comprises monitoring the lengths of several periods of inactivity at which the mobile radio network disconnects the IP connection.
INTERFACES TO MANAGE DIRECT NETWORK PEERINGS
Methods and apparatus for interfaces to manage direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator. The coordinator implements a programmatic interface defining connectivity operations. The coordinator receives a request for dedicated connectivity to data center resources, formatted according to the interface. The coordinator selects a target endpoint router at which to establish a physical link to implement the dedicated connectivity, and transmits a response identifying the target endpoint router and including configuration instructions for setting up a physical link for the dedicated connectivity.
INTERFACES TO MANAGE DIRECT NETWORK PEERINGS
Methods and apparatus for interfaces to manage direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator. The coordinator implements a programmatic interface defining connectivity operations. The coordinator receives a request for dedicated connectivity to data center resources, formatted according to the interface. The coordinator selects a target endpoint router at which to establish a physical link to implement the dedicated connectivity, and transmits a response identifying the target endpoint router and including configuration instructions for setting up a physical link for the dedicated connectivity.
SYSTEMS AND METHODS FOR CREDENTIALING OF NON LOCAL REQUESTORS IN DECOUPLED SYSTEMS UTILIZING A DOMAIN LOCAL AUTHENTICATOR
Embodiments as disclosed provide systems and methods that use a local authenticator within a domain to provide a credential to access a resource of the domain to a non-local requestor. When a request is received from a non-local requestor at the domain the non-local requestor can be authenticated based on the request. The local authenticator can then be accessed to obtain a credential. This credential may be the same type of credential provided to members of the domain when they authenticate using the local authenticator. The credential is provided to the non-local requestor so the non-local requestor can access the resource of the domain using the credential and authentication of the non-local requestor with respect to these accesses can be accomplished using the local domain authenticator and the credential.
Apparatus and Method for Managing Events in a Computer Supported Collaborative Work Environment
Aspects of the subject disclosure may include, for example, participating in a communication session over a network with a second communication device that is remote from the communication device where the communication session includes a computer supported collaborative work environment utilizing a non-baton passing protocol, presenting content at a display device where the content is presented by the second communication device at a second display device, receiving first user input at the user interface where second user input is received by the second communication device where a conflict resolution is applied to events associated with the first and second user input, and presenting adjusted content at the display device. Other embodiments are disclosed.
Apparatus and Method for Managing Events in a Computer Supported Collaborative Work Environment
Aspects of the subject disclosure may include, for example, participating in a communication session over a network with a second communication device that is remote from the communication device where the communication session includes a computer supported collaborative work environment utilizing a non-baton passing protocol, presenting content at a display device where the content is presented by the second communication device at a second display device, receiving first user input at the user interface where second user input is received by the second communication device where a conflict resolution is applied to events associated with the first and second user input, and presenting adjusted content at the display device. Other embodiments are disclosed.